Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Full Access
Question # 5

In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?

A.

JNDI Injection

B.

JNDI Injection

C.

JNDI Injection

D.

None of the above

Full Access
Question # 6

You found the xmrpc.php endpoint while performing a security assessment on a web application. The target application is most likely using which of the following Content Management Systems (CMS)?

A.

WordPress

B.

Drupal

C.

Both A and B

D.

None of the above

Full Access
Question # 7

Which of the following is considered as a safe password?

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Full Access
Question # 8

The application is vulnerable to Cross-Site Scripting. Which of the following exploitation is NOT possible at all?

A.

Steal the user's session identifier stored on a non HttpOnly cookie

B.

Steal the contents from the web page

C.

Steal the contents from the application's database

D.

Steal the contents from the user's keystrokes using keyloggers

Full Access
Question # 9

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

A.

Developers must not list any sensitive files and directories in this file

B.

Developers must list all sensitive files and directories in this file to secure them

C.

Both A and B

D.

None of the above

Full Access
Question # 10

Determine the primary defense against a SQL injection vulnerability

A.

Using a Web Application Firewall (WAF)

B.

Prepared Statements with Parameterized Queries

C.

Use of NoSQL Database

D.

Blacklisting Single Quote Character (‘)

Full Access
Question # 11

In the context of the following JWT token, which of the following statements is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

A.

The highlighted segment of the token represents a JWT Header.

B.

The highlighted segment of the token represents a JWT Payload.

C.

Both A and B are correct.

D.

None of the above.

Full Access
Question # 12

After purchasing an item on an e-commerce website, a user can view his order details by visiting the URL:

https://example.com/order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id.

Which of the following is correct?

A.

The root cause of the problem is a lack of input validation and by implementing a strong whitelisting, the problem can be solved

B.

The root cause of the problem is a weak authorization (Session Management) and by validating a user's privileges, the issue can be fixed

C.

The problem can be solved by implementing a Web Application Firewall (WAF)

D.

None of the above

Full Access
Question # 13

Which of the following Google Dorks can be used for finding directory listing on victim-app.com?

A.

intitle:"Index of" site:victim-app.com

B.

intext:"Index of" site:victim-app.com

C.

Both A and B

D.

None of the above

Full Access
Question # 14

Based on the below HTTP request, which of the following statements is correct?

POST /changepassword HTTP/2

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: same-origin

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Content-Length: 95

new_password=usher!@22&confirm_password=usher!@22

A.

The change password feature does not validate the user

B.

The change password feature uses basic authorization

C.

The change password feature is vulnerable to Cross-Site Request Forgery attack

D.

All of the above

Full Access
Question # 15

Based on the screenshot below, which of the following statements is true?

HTTP/1.1 200 OK

Accept-Ranges: bytes

Age: 359987

Cache-Control: max-age=604800

Content-Type: text/html; charset=UTF-8

Date: Fri, 02 Dec 2022 18:33:05 GMT

Expires: Fri, 09 Dec 2022 18:33:05 GMT

Last-Modified: Mon, 28 Nov 2022 14:33:18 GMT

Server: Microsoft-IIS/8.0

X-AspNet-Version: 2.0.50727

Vary: Accept-Encoding

X-Powered-By: ASP.NET

Content-Length: 1256

A.

The application is using an outdated server technology

B.

The application is disclosing the server version

C.

The application is disclosing the version of the framework used

D.

All of the above

Full Access
Question # 16

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

In the scenario described above, which of the following is correct?

A.

There is no urgency to renew the certificate as the communication is still over TLS

B.

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Full Access
Question # 17

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

http://example.com/reset_password?userId=5298

Which of the following is true?

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

Full Access
Question # 18

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Full Access